Bitmaps and bitmasks: Efficient tools to compress deterministic automata

Subramanian Shiva Shankar, Lin PinXing, Andreas Herkersdorf, Thomas Wild

Research output: Contribution to journalArticlepeer-review

Abstract

Accelerating the signature matching function is essential to perform Deep Packet Inspection (DPI) at line rates. The conversion of the signatures into the Deterministic Finite Automaton (DFA) enables performance of this function at linear time. However, since the DFA is extremely storage inefficient, it is compressed before being stored in the memory. Although state-of-the-art bitmap-based compression algorithms can perform line rate signature matching, they only achieve transition compression of ~90-95%. Addressing the storage inefficiency, two bitmap-based transition compression algorithms were proposed by Subramanian et al. in 2016 to achieve transition compression of over 98%. A theoretical relationship is established in this article between the achievable signature matching throughput and the number of pipeline stages required to perform the decompression through the hardware accelerator based on the proposed techniques. Additional optimizations are proposed and evaluated to improve the per-stream signature matching throughput through the proposed decompression engines. The experimental evaluation of the optimizations shows that the per-stream signature matching throughput can be improved by a factor of 1.2-1.4x. A software model of the proposed decompression engines was designed and evaluated across a multitude of payload byte streams to verify the functional correctness of the proposed compression methods.

Original languageEnglish
Pages (from-to)41-75
Number of pages35
JournalAustralian Journal of Telecommunications and the Digital Economy
Volume6
Issue number3
DOIs
StatePublished - Sep 2018

Keywords

  • Deep Packet Inspection
  • Finite Automata
  • Network Security
  • Regular Expressions
  • Transition Compression

Fingerprint

Dive into the research topics of 'Bitmaps and bitmasks: Efficient tools to compress deterministic automata'. Together they form a unique fingerprint.

Cite this